-
3
-
-
0041438387
-
IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks
-
F. Bai, N. Sadagopan, and A. Helmy, "IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks," in Proc. of Infocom, 2003.
-
(2003)
Proc. of Infocom
-
-
Bai, F.1
Sadagopan, N.2
Helmy, A.3
-
4
-
-
0005908365
-
Distributed firewalls
-
November
-
S. M. Bellovin, "Distributed firewalls," ;login:, pp. 39-47, November 1999.
-
(1999)
Login
, pp. 39-47
-
-
Bellovin, S.M.1
-
5
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of ACM, vol. 13, no. 7, pp. 422-426, July 1970.
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
6
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
DOI 10.1002/wcm.72
-
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communication and Mobile Computing: Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, pp. 483-502, Sep. 2002. (Pubitemid 135713186)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
7
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
DOI 10.1145/1282380.1282382, ACM SIGCOMM 2007: Conference on Computer Communications
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: taking control of the enterprise," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 1-12, 2007. (Pubitemid 350239768)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Mckeown, N.5
Shenker, S.6
-
8
-
-
44249126961
-
Sane: A protection architecture for enterprise networks
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. Mckeown, and S. Shenker, "Sane: A protection architecture for enterprise networks," in Usenix Security Symposium, 2006.
-
(2006)
Usenix Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
11
-
-
85017404375
-
A group mobility model for ad hoc wireless networks
-
X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, "A Group Mobility Model for Ad Hoc Wireless Networks," Proc. of the ACM Int. Workshop on Modelling and Simulation of Wireless and Mobile Systems, 1999.
-
(1999)
Proc. of the ACM Int. Workshop on Modelling and Simulation of Wireless and Mobile Systems
-
-
Hong, X.1
Gerla, M.2
Pei, G.3
Chiang, C.-C.4
-
12
-
-
84867338222
-
Secure border gateway protocol (S-BGP) - Real world performance and deployment issues
-
February
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo, "Secure border gateway protocol (S-BGP) - real world performance and deployment issues," in Proceedings of the IEEE Network and Distributed System Security Symposium, February 2000.
-
(2000)
Proceedings of the IEEE Network and Distributed System Security Symposium
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
13
-
-
0033743163
-
Secure border gateway protocol (Secure-BGP)
-
April
-
S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (Secure-BGP)," IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, pp. 582-592, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
14
-
-
84907551158
-
Wireless hierarchical routing protocol with group mobility
-
G. Pei, M. Gerla, X. Hong, and C. chuan Chiang, "Wireless hierarchical routing protocol with group mobility," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 1999.
-
(1999)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC)
-
-
Pei, G.1
Gerla, M.2
Hong, X.3
Chiang, C.C.4
-
17
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Jan-Mar
-
D. Raymond and S. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan-Mar 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.1
Midkiff, S.2
-
18
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, L. Zhang, and S. Member, "Statistical en-route filtering of injected false data in sensor networks," in INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
Member, S.5
-
19
-
-
51349133403
-
-
Department of Computer Science, Columbia University, Tech. Rep. CUCS-017-07, March
-
H. Zhao and S. M. Bellovin, "Policy algebras for hybrid firewalls," Department of Computer Science, Columbia University, Tech. Rep. CUCS-017-07, March 2007.
-
(2007)
Policy Algebras for Hybrid Firewalls
-
-
Zhao, H.1
Bellovin, S.M.2
-
20
-
-
79952549607
-
-
Department of Computer Science, Columbia University, Tech. Rep. CUCS-33-09, July
-
-, "Source prefix filtering in ROFL," Department of Computer Science, Columbia University, Tech. Rep. CUCS-33-09, July 2009.
-
(2009)
Source Prefix Filtering in ROFL
-
-
Zhao, H.1
Bellov, S.M.2
-
22
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in IEEE Symposium on Security and Privacy, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|